Person in hoodie sitting in front of a laptop with external monitor, looking at code

Thought your Node.js latest Docker image was safe?

jan
By: Jan Schulte
Oct 12, 2023

For all developers who run containerized JavaScript workloads in production: Is relying on node:latest as your base image a safe choice? It's effective from a developer productivity standpoint as you're up and running quickly. Have you ever wond...

fig2-attack-paths-Panoptica

Technical Deep Dive of Cloud Environment Graphs and Attack Paths 

Roy Maor
By: Roy Maor
Jan 9, 2023

In this article, we will break down the complex orchestration required to form a cloud environment graph and utilize it for detection and prioritization of attack paths. One of the most valuable security outputs that cloud owners can unlock through ...

Map-5

Understanding Attack Paths and Attack Path Analysis in a Stateful Cloud Environment Graph 

Roy Maor
By: Roy Maor
Jun 30, 2021

Attack path analysis can be a complex beast. We’ve spoken in the past about how a graph-based approach to security risk analysis can elevate your cloud security posture overall. Check out this previous article to learn about the building blocks of...

cloud-visibility-header

Can There Be Too Much Cloud Visibility in a Cloud Environment?

Vladi Sandler
By: Vladi Sandler
Apr 19, 2021

Everywhere you look in cloud security, you’ll see experts waxing lyrical about the importance of visibility. Trust us, we get it! If you can’t get an active and accurate view of everything that’s going on inside your environment, from con...